Models provide way to formalize security policies

Assignment Help Basic Computer Science
Reference no: EM132750237

In information security, models provide a way to formalize security policies. Such models can be abstract or intuitive. All models are intended to provide an explicit set of rules that a computer can follow to implement the fundamental security concepts, processes, and procedures that make up a security policy. The models offer a way to deepen your understanding of how a computer operations system should be designed and developed to support a specific security policy. No system can be totally secure; security professionals have several security models to consider.

Let's say you work for one of the following types of industry:

Manufacturing

Government

Research

Service

Consulting

Choose a different industry than from last week's discussion, and then from the list below, select a model and summarize the model as you understand it. State why you might use this model in your job. Include at least one advantage and disadvantage of the model you've chosen. Include a real-life example of the model in use. 

Make sure to include any special or unique security feature for the model.

Trusted computing base

State machine model

Information flow model

Noninterference model

Take-Grant model

Access control matrix

Bell-LaPadula model

Biba model 

Clark-Wilson model

Brewer and Nash model (also known as the Chinese wall)

Goguen-Meseguer model

Sutherland model

Graham-Denning model

Reference no: EM132750237

Questions Cloud

How large must each deposit be : If Michael is planning to make his first deposits today, how large must each deposit be for him to be able to put Jimmy through university?
How much debt could the company raise : How much debt could the company raise if the interest rate of the new debt was 10% instead of 8%? The firms existing EBIT is $5.0 million
Draw a cvp graph and mark the breakeven point : Draw a CVP graph, and mark the breakeven point, profit area, and loss area. The Tyson Company produces a single product cost and price data
Effectiveness of caterpillar operational plan for global : Using supporting research and data, what is the effectiveness of Caterpillar's operational plan for global strategies
Models provide way to formalize security policies : In information security, models provide a way to formalize security policies. Such models can be abstract or intuitive.
Who do you think is the biggest challenge issue : Among this group of people, who do you think is the biggest challenge issue in terms of Personality Disorder? Why do you think so?, and What do you suggest to.
Find the expected return according to the capm : Supposed Intel stock has a beta (ß) of 1.6. The risk-free rate is about 6 percent. Determine the expected return according to the CAPM
Evaluate the effectiveness of caterpillar operational plan : Evaluate the effectiveness of Caterpillar's operational plan for global strategies (international, multi-domestic, global-standardization, or transnational).
Prepare issuer journal entry to record initial bond : Using the straight-line method to amortize bond discounts and premiums, (a) prepare the issuer's journal entry to record the initial bond issuance

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How would you describe the process of certification

How would you describe the process of certificatio Explain your thoughts regarding the process of accreditation. Is it a formality, or will it guarantee that PVSS will actually correct the remediation finding? Would this opinion regarding accreditati..

  Present an organizational or government function

Present an organizational or government function that could be operated more efficiently with the introduction of competition.

  Necessity in today business environment

Information Governance: A Necessity in Today's Business Environment. What evidence shows that the phenomenon described by your thesis

  Describe the history and development of unions

Describe the history and development of unions in federal employment.

  Remember that annotation is not the same as abstract

Remember that an annotation is not the same as an abstract. Abstracts are descriptive. Your annotations are to be evaluative and critical.

  Benefit of role based access control

What is benefit of RBAC? RBAC has the following components: users, roles, permission and session. What are user-role assignment and permission-role assignment?

  Operating performance and financial position

Examine how a financial statement reader may assess a company's operating performance and financial position using each of the following analytical techniques:

  What is its impact on file sharing and privacy

Does the 1998 Digital Millenium Copyright Act (DCMA) law encourage or limit innovation? What is its impact on file sharing and privacy?

  What maximum shear stress exists at the inner surface

What maximum shear stress exists at the inner surface?

  Sensor data management systems

1. How can the sensor data management systems place the value to offer the proper information to the consumers correctly?

  Describe the plain view doctrine

Describe the plain view doctrine, and why it has such a significant impact on digital forensics? What are three approaches to determining whether the doctrine

  Script should display the message

Print a "Thank You" Message on a new line: Before stopping, the script should display the message Thank you followed

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd